Data Theft

Addressing Employee Data Theft in your Organization

Addressing Employee Data Theft in your Organization Almost a decade ago, Jason Needham left his job at an engineering firm to start his own company. After resigning, through virtual backdoors and unauthorized accounts, Jason was able to continue accessing his former employee’s data and systems. Over two years after leaving the company, Needham went on …

Addressing Employee Data Theft in your Organization Read More »

Kwampirs Malware targeting Global Industries

Kwampirs Malware targeting Global Industries Including the Healthcare Sector, Supply Chain,Financial Institutions, and prominent Law firms. The Federal Bureau of Investigation (FBI) has sent a security alert to the U.S. private sector about an ongoing attack against the healthcare sector, supply chain software vendors, financial institutions and prominent law firms. This campaign uses a malicious …

Kwampirs Malware targeting Global Industries Read More »

A Quick Guide to Workplace Investigations

A Quick Guide to Workplace Investigations Cyber security breaches stemming from insider threats have increased consistently over the last few years. While companies seek to hire the best, brightest, and most ethical people to help make their business a success, things don’t always go as planned. Circumstances change, motivations transform, and commitment levels shift. Before …

A Quick Guide to Workplace Investigations Read More »

Insiders Threats and Unexplained Inventory Loss: A Response Guide

Insiders Threats and UnexplainedInventory Loss: A Response Guide Employee relationships should be based on trust. Our staff, after all, are on the frontline of the business, creating products, selling them, interacting with customers, and more. However, trust can sometimes be broken. This was the case when a U.S. man working in collusion with an employee of …

Insiders Threats and Unexplained Inventory Loss: A Response Guide Read More »

COVID-19 Cyber Threat Indicators

COVID-19 Cyber Threat Indicators COVID-19 has produced a worldwide physical virus scare that has everyone on edge. Unfortunately, Hackers have not wasted any time in capitalizing on taking advantage of those suffering from the deadly effects of COVID-19. To prevent further compromise, you must take precautions within your corporate networks to implement safeguards against the …

COVID-19 Cyber Threat Indicators Read More »

Using Penetration Testing to Stop a New Stealth Breed of Ransomware Attacks

Using Penetration Testing to Stop a New StealthBreed of Ransomware Attacks Ransomware is arguably one of the most insidious and damaging forms of malware. Cybercriminals are continually exploiting newer methods to circumvent strategies by enterprises to thwart ransomware attacks. A recent post by Microsoft on ransomware talks about a new breed of malware that uses stealth to …

Using Penetration Testing to Stop a New Stealth Breed of Ransomware Attacks Read More »